[go: up one dir, main page]

CN104081311B - For the apparatus and method for the operation for managing mobile device - Google Patents

For the apparatus and method for the operation for managing mobile device Download PDF

Info

Publication number
CN104081311B
CN104081311B CN201180075925.7A CN201180075925A CN104081311B CN 104081311 B CN104081311 B CN 104081311B CN 201180075925 A CN201180075925 A CN 201180075925A CN 104081311 B CN104081311 B CN 104081311B
Authority
CN
China
Prior art keywords
equipment
interface
charger
processor
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201180075925.7A
Other languages
Chinese (zh)
Other versions
CN104081311A (en
Inventor
B·R·布雷特
P·M·彼得森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of CN104081311A publication Critical patent/CN104081311A/en
Application granted granted Critical
Publication of CN104081311B publication Critical patent/CN104081311B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

A kind of charger includes the first storage region, for storing control software;Charging circuit, for sending electric power by interface;And processor, for generating at least one control signal based on control software.It is used to charge to the battery of the equipment coupled to the interface by the electric power transmitted by interface, and at least one described control signal includes the information of the state for making monitoring operation be executable to determine the equipment.

Description

For the apparatus and method for the operation for managing mobile device
Technical field
One or more embodiments described herein are related to the operating system or other functions of management electronic equipment.
Background technology
It is connected to smart phone, notebook, media player and other portable sets of network easily quilt The virus having a negative impact to performance and other agencies are infected.When infecting, equipment must be returned to manufacturer Or handled to carry out possible reparation by technical staff.If reparation is possible, taken return to equipment can be grasped Significant data that the behavior of the state of work many times causes to will be stored in internal storage circuit, using and/or other letters Breath is deleted.For a user, these shortcomings transform into inconvenient and excessive cost.
Brief description of the drawings
Fig. 1 shows the embodiment of the device for control electronics.
Fig. 2 shows the embodiment for the device that be used to control smart phone.
Fig. 3 shows the embodiment of the method for control electronics.
Fig. 4 shows the operation corresponding with monitoring operation.
Fig. 5 shows another embodiment of the device for control electronics.
Embodiment
Fig. 1 shows one embodiment of the device for control electronics 10, and the electronic equipment 10, which has, to be needed again The battery of charging.The equipment can be smart phone, notebook or laptop computer, personal digital assistant, camera, flat Plate computer, pad or pod types equipment, media player, or can by or can not be entered by wired or wireless interface and network The other kinds of personal digital assistant device of row communication.The equipment can also be that the flash memory being attached by appropriate interface drives Dynamic device or portable or external fixed disk drive.The network can be internet and/or can be to electronic equipment and from electricity Any other type of sub- equipment transmission data.In order to illustrate, the electronic equipment is shown as smart phone.
The smart phone includes port 20, and the port 20 is operably coupled to the connector in the first end of interface 30 25.The other end of the interface is coupled to the charger that can be taken many forms.A kind of form is charger 40, the charging Device 40 is equipped with USB port 41 at one end, and it is removably coupled to the plug 42 for being attached to the interface.In opposite end, Charger 40 can include the arrangement for being suitable for the contact pin 43 of standard wall outlet or other standards power supply, and this can generally be claimed For " main body ".
Charger 50 can be similar with charger 40, permanently connected except existing between interface 30 and charger.
Charger 60 can be equipped with being operably coupled to the USB interface port 61 of interface 30 notebook or other The computer or processing equipment of type.In Fig. 1, the interface can be USB interface.However, in other embodiments, the interface It can be another type, include but is not limited to:Live wire, Serial Advanced Technology Attachment (SATA) type interface, thunder and lightning, Ethernet, pleasure Appointing in device digital interface (MIDI), general Host Controler Interface (UHCI) or various other wired or wireless style interfaces What is a kind of.
Fig. 2 shows one embodiment of charger 80 in block diagram form.The charger can be with charger 40 or 50 In any one is corresponding, and according to one embodiment, charger 80 includes charging circuit 81, processor 82, first deposited Storage area domain 83, and the second storage region 84, such as the memory for storing control software (s/w), the control software (s/w) For the one or more operations for controlling to be performed by controller.
Charging circuit 81 is coupled to power supply, and the power supply can be that such as wall outlet, automobile or other electronics are fitted Orchestration or in charger or it is coupled to the battery of charger.Charging circuit can include detector, for detecting phone 10 connection, and based on such detection, can send electric power to charge to telephone cells by interface 30.Charged The amount of power transmitted in journey can be controlled based on predetermined Managed Solution, be realized by protection circuit and/or software, with Prevent overcharge and/or the generation of the other types mistake of connected phone may be damaged.
Processor 82 performs the management that can be instructed at least in part by the control software in the first storage region and grasped Make.These operations include:Monitoring operation, the state for determining phone;One or more recovery operations, for based on the state To control phone;And/or backup operation, it is for storing data and other information in the phone.These operations will combine Fig. 3 Method discussed in more detail.
Management operation can be performed at the following moment:For example, being connected to charger when phone, being connected in phone Scheduled time after charger, when receiving trigger signal from phone, and/or when detecting scheduled event.According to one Embodiment, during being charged to telephone cells, performs all or part of of management operation, so that saturating to user It is bright.As a result, Telephone Management Agency and charging can occur, for example, when user sleeps or be busy simultaneously.
In other embodiments, completed in charging and phone is still detected after being connected with charger and can held Row manages all or part of of operation.In these cases, it can postpone to have completed to indicating charging on call screen Message display, so as to allow to perform it is described management operation.
Once performing, the message and/or other message generated based on the result of management operation can be shown to notify User and/or one or more selections are asked to user, this will be explained in more detail in discussion below.
In other embodiments, all or part of of management operation can be performed before charging starts.In these feelings Under condition, charging operations can be postponed before monitoring operation or other one or more management operations have result.Now, from filling The electric power of the charge power supply of electrical equipment can be used for operating phone.This can provide benefit, if for example, phone is seriously felt Contaminate or by security threat, from without necessity of charging, because phone needs to be repaired or changed immediately by technician.
Second storage region 84 can be used as the storage for storing the Backup Data received from phone and/or other information Storehouse.The data and information can be received according to by the management operation of computing device and/or can be based on by phone The instruction or other orders of framework startup is managed to receive the data and information.The capacity of storage region can less than or equal to Gigabyte changes in the range of several gigabytes.
Interface 30 includes the multiple signal wires for being used to perform charging and management function for phone.The signal wire can be with Including:Telephone cells are filled by one or more (n) power lines 31 for electric power to be sent into phone from charger Electricity;With one or more (m) data and/or control line 32, for bidirectionally transmitted between charger and phone signal with Perform foregoing management operation.At this point, power line (multiple power lines) be coupled to charging circuit 81 and data and/ Or control line is coupled to processor.
Phone can be operated for example based on any one of several operation systems, the operating system include but It is not limited to:Apple operating systems, Android operation system, Windows type operation systems, Symbian operating systems, Blackberry operating systems, the operating system based on Linux, the operating system based on Java, tailored version software and other. Although equipment 10 is identified as smart phone, equipment 10 can be another type of phone in other embodiments, including The type of smart phone, the function being for example commonly referred to as now or conventional mobile phone might not be classified as.In addition, setting Standby 10 can be the another type of equipment that possible be infected by malware, such as E-book reader, panel computer, notebook Computer, net book and game station.
In Fig. 2, phone 10 is shown as including by citing:Controller 22, for performing operating system software 24 and firmware 25;Deposit Reservoir 23, for storing the data associated with the use of phone, including contact person, text message and/or application program;And Charging control circuit 26, for controlling the charging carried out to battery 27 from charger reception electric power.In this arrangement, charge electricity The line 31 and controller that interface is coupled on road are coupled to the line 32 of interface.
Operating system software is controlled to the execution for dominating the function of the generation operation of phone, and firmware can include Various monitoring are performed for phone, the fail-safe software (or so-called secure firmware) of operation is safeguarded and repair.The firmware can be with Including for monitoring and inspection system basic input/output (BIOS), network connection, storage and/or operation with equipment Related otherwise secure firmware.It can also store except the firmware with safety in addition to especially relevant.
Firmware can be considered as a part for operating system software or can differently store.According to one embodiment, Interaction between the processor of charger and the operation performed by controller based on equipment firmware can allow or assist to perform The management operation of charger.
Fig. 3 shows operation included in one embodiment for the method for control electronics, and the electronics is set It is standby can be it is aforementioned any one.For exemplary purposes, it is assumed that the equipment is the intelligence electricity shown in Fig. 2 Words.This method can be performed by the charger 80 shown in figure.However, in another embodiment, can use different from being somebody's turn to do The device of charger performs one or more operations of this method.(example combination Fig. 4 of another type of device is begged for By, wherein, other described devices are corresponding with notebook).
This method includes the connection (block 310) by interface 30 between detection charger 80 and electronic equipment 10.Now, if Standby can be start, and battery electric quantity is less than or equipment can be shutdown.According to for example passing through the one or more of interface The voltage or capacitance level on signal and/or one or more signal wires of interface that signal wire is exchanged, (and are set by processor 82 Controller in standby) detect connection.
Once detecting connection, then determine that the power supply of equipment is on or off (block 320) by processor 82.For example, can be with Signal level on one or more lines based on interface makes the determination by other standards technology.
In one embodiment, if the power supply of equipment is opens, processor 82 to the sending signal of device controller 22 with Perform reboot operation (block 321).Once signal is received, then basic input-output system of the controller based on such as storage inside (BIOS) software or other processes for being performed under device operating system control restart the equipment.
If processor 82 determines the power supply of equipment to close, when detecting to be connected to charger, the operation system of equipment System software or firmware turn on the power and start startup function (block 322).
After starting or restarting, the processor in charger 82 is based on being programmed into one or more of control software 84 bar Part to perform monitoring operation (block 330) to equipment.One or more conditions can include:To the connection between charger and equipment Detected, detect connection after reach predetermined time period (for example, being determined by the clock inside processor), for equipment The state for the charging operations that battery is performed, to the reception of the trigger signal initiated from the equipment (for example, being charged detecting connection After device or be programmed into operating system software or firmware is transmitted), and/or when detecting some other predetermined events When.
According to one embodiment, monitoring operation includes:Determine whether equipment has been damaged operating system or had The one or more viruses for the operation having a negative impact, which infect, whether equipment includes is damaged or infected file, and/ Or whether equipment has been subjected to security threat.Destruction may occur, for example, due to the virus from internet, magnetic or electromagnetism Interference, physical damage (for example, equipment drops), the internal fault of operating system, the improper installation for updating software, or equipment Any number of other influences of manufacturing defect and possible damage equipment operation in hardware or operating system.
According to a specific example, equipment can be determined being infected (for example, with one or more impaired File) but firmware be not infected and in normal condition.According to another example, equipment can be due to firmware failure or damage And be confirmed as being infected, but be due to the failure or damage agency, to firmware inspection indicate firmware be effective.
With reference to Fig. 4, according to one embodiment, the secure firmware 25 in equipment makes controller 22 be sent out to the processor of charger Notification signal is sent to indicate that firmware is ready for performing (block 331).Once receiving the signal, cradle processor starts monitoring Function, for example, consider following it is assumed that the equipment connected is new equipment.
Monitoring operation can include from the processor of charger to device controller sending signal, to ask device controller To perform security sweep or other processes so that it is determined that the state (block 332) of equipment.Based on the signal received or according to one Other a little determinations, the controller of the equipment performs scanning/process (block 333).
According to one embodiment, security sweep/process can perform the school of file including the use of MBR (MBR) Test and operate.MBR can include the partition table for describing the memory cell subregion of equipment, and the memory cell of the equipment can be wrapped Memory 23 and/or other one or more internal storages are included, other one or more of internal storages include multiple Any one in read-only and/or random access memory.Scan the file in each subregion with determine they state and If there is being damaged or infected file, it can be identified.According to one embodiment, such as Microsoft can be used File verification and completeness check program (FCIV) instrument safeguard the database of signature.The signature can be stored in charging Device, equipment or the two in.
Except performing verification with function or as the replacement for performing verification and function, the secure firmware of equipment can be performed Other kinds of security sweep.Example includes:Test for determining sector or region bad in internal storage;For positioning Wrong test in operating system software, firmware or file;Boundary scan testing;Register Scan;Interior kernel analysis and for fixed Position Malware, Trojan Horse, cookie, virus, spam, worm, root kits process, and/or for positioning The test of other kinds of pollution agency, the pollution agency includes the pollution generation for being used to damage data and other types file Reason.
Once verification and operation and/or security sweep/process are completed, it as a result will be sent to and filled by controller by interface The processor (block 334) of electrical equipment.For example, this can use correspondence or similar to the credible execution skill inside Intel's Vpro frameworks The mode of art (TXT) function is realized, if can be using such framework in equipment.If it is not possible, can then be based on setting The compatible technology of standby operating environment sends result using another hardware and/or software.
The processor of charger determines the state (block 335) of equipment based on result.If for example, do not had by secure firmware Problem is navigated to, then the state that equipment has had can be determined, for example, in suitable operating environment.Otherwise, can be with base Environment that is vulnerable or damaging is in the state that equipment is determined by which problem of Scan orientation.
Fig. 3 is returned to, if state is not good enough, the processor of charger can send control of the backup signal to equipment Device.Backup signal can be backed up (block with instruction equipment controller to data, file and the other information of storage in a device 340).In response to backup signal, file, data and/or other information (can be stored in memory 23 by the controller of equipment And/or in other interior locations) send to charger to be stored in storage region 83.It can for example be based on being included in backup letter Firmware in information, equipment or operating system software or combination in number, come determine to be backed up specific data, File and information.(at this moment perform the backup operation.As will be explained, backup operation can be after restorer be attempted Perform, as will be described).
After the state of equipment is determined, the processor of charger can send controller of the activation signal to equipment.Should Activation signal can perform one or more recovery operations (block 350) with instruction equipment controller.It is preprogrammed into equipment firmware Or these operations in software or cradle processor can retrieve the software for performing recovery operation from memory 84 To be delivered to equipment by interface.
The recovery operation to be performed be based on the scanning/process performed by equipment safety firmware found it is certain types of The recovery operation of problem.For example, recovery operation can include file access pattern function, the file access pattern function includes:To having deleted File in the file removed or bad sector in memory or region is recovered, the file damaged is recovered, Deleted with the file to having damaged.Any one of many file rescue plus and software can be used extensive to perform It is multiple.It can also carry out recovery operation and equipment returned into previously positioned or acceptable state, for example, similar to for computer Or the mode that the system performed by other equipment is recovered.
Attempt after recovering, based on the signal of the internal firmware transmission from cradle processor and/or equipment, that is initiated can The backup operation of choosing can be performed to backup to data, file and/or other information in the storage region of charger.Because Equipment is confirmed as not working completely or partially, and recovery operation fails equipment returning to kilter or if recovery operation Failure, then can access the content of the second storage region 84 later.
Perform after recovery operation, device controller can make presentation of information on the screen of the device.Information can provide example The instruction (block 360) for the result that monitoring as performed in equipment is operated.These results can include for example being performed by secure firmware Security sweep/process result.According to one embodiment, one in following message can be shown on device screen:
State
Do not pinpoint the problems
It was found that seeming believable change
Safety may be jeopardized
In response to second or the 3rd message display, user can be in response to shown state from the control dish of display One (block 370) in multiple options is selected in list.Perform one in following act:
Shutdown
Start (acquiescence, if user only pulls up equipment from interface)
Call the telephone number upgraded for automatic software
Backup Data in charger is delivered to website storage
To network delivery notification message
Call center is called to be repaired
According to one embodiment, foregoing monitoring, recovery or backup operation are performed during being charged to telephone cells In all or part of.As a result, Telephone Management Agency and charging can occur, for example, when user sleep soundly or be busy simultaneously.
Alternatively, it is possible to battery charging start before or battery charging completed after perform these operation in All or part of.If before battery charging starts, the controller of equipment can be powered by charger without Device battery is charged.
This method can also include multiple additional or optional operation.For example, for performing security sweep to determine electricity The monitoring operation of speech phase can be performed before formal start-up operation is performed.This can be by being powered to hold to controller Row scanning is realized without enabled systems BIOS.Then, can be at least for quilt based on the state of the equipment determined by scanning It is determined that being uninfected by or the part of equipment with excellent operation state or subsystem perform start-up operation.
The example of these parts or subsystem includes core kernel, device driver, system service (for example, demons) And application program.If core kernel is by checking, it can optionally be activated.However, this can be prevented certain Under the conditions of the other parts of operating system or other software be loaded, run and/or access.For example, testing core kernel Card may allow equipment to start, but such as the application program of equipment camera driver etc may not then work, until driving Dynamic device software (or relevant portion of operating system software) can be resumed or repair.
This selective startup can be performed based on the control signal from cradle processor, or can be with Operating system software or firmware based on equipment are performed automatically.
Except foregoing monitoring and recovery operation, the operating system of equipment can have hook in its file system, should Hook is used as recognizing and/or intercepts the basis for the request for opening file.This can be used for setting up listed files with whole Individual equipment is used when being activated.Then filename and signature and data in file attribute can be sent to the processing of charger Device.
Equally, the request for opening file can be merely deferred until that signature is electrically charged device checking, but then can be as early as possible Continue, so that avoid the time that alarm clock and miscellaneous part are disabled is longer than a bit of time, such as several seconds.
Equally, after monitoring operation is performed but before recovery generation, the processor of power manager and/or the behaviour of equipment The message for giving the option how user performs recovery can be shown by making system software/firmware.For example, the message can be in charging Period or charging are shown before or after performing.The message can include the option list being listed below.Be then based on by The selection that user makes performs recovery operation, including or does not include previously and/or backup operation afterwards.
Recover option
Recover to recovery point
1) it is nearest
2) selected from list
Recover to factory default setting
Fig. 5 shows another embodiment of the device for control electronics.In this embodiment, interface and electronics are set It is standby to be any types and be configured in a similar manner to the embodiments described above.But, power manager 200 is to calculate Machine, it can be desktop computer or portable computer, such as notebook, panel computer or other computing devices.
Computer includes being used for the port 61 coupled to interface 30.The control software of storage in a computer is performed similarly to The operation of processor in Fig. 2 power manager and additional operations.For example, backup operation can be performed, the backup behaviour Work is related to the data for receiving slave unit, file and other information and is delivered to network storage location, the network storage location bag Include but be not limited to:The server and/or cloud-type storage region of the wireless service provider of equipment or other be located at long-range deposit Storage area domain.If equipment is infected or safety is on the hazard, then Backup Data can be accessed to allow equipment extensive later The multiple data.
According to another embodiment, non-emporary computer-readable medium stores the journey for controlling all any equipment as the aforementioned Sequence.Storage medium can be internal read-only or random access memory or another type of memory, and program then includes being used for Perform the code of the operation of method described herein.
Except the charger shown in Fig. 1, according to another embodiment, charger can include charging to the battery of equipment The used internal cell of its own.For example, for help traveller or those not in oneself office or the people of family, this The embodiment of sample will may be useful for.
The specific feature, the structure that all show to combine that the embodiment is described are referred to any of " embodiment " in this specification Or during characteristic is included at least one embodiment of the present invention.Such phrase that diverse location occurs in specification, which differs, establishes a capital Refer to same embodiment.Further, should when specific feature, structure or characteristic are described with reference to any embodiment Think that it is within the visual field of those skilled in the art that such feature, structure or characteristic are completed with reference to other embodiment. Equally, the feature of any one embodiment described herein can be combined with the feature of one or more other embodiments with Form additional embodiment.
Further, in order to be readily appreciated that, some functional modules can be depicted as single module;However, these lists The module solely described is explained not necessarily in the order for being discussed herein or presenting.For example, some modules can simultaneously, with not Same order etc. is performed.
Although herein with reference to multiple exemplary embodiments, invention has been described it should be appreciated that this The various other modifications and embodiment that the technical staff in field can design will be fallen into spirit and scope.More Especially, in the range of foregoing disclose, accompanying drawing and appended claims, to theme combine arrangement component parts and/ Or it is possible that arrangement, which carries out rational variants and modifications, without departing from the spirit of the present invention.Except component parts and/or cloth Variants and modifications in putting, to those skilled in the art, alternative purposes are also obvious.

Claims (12)

1. a kind of charger, including:
First storage region, for storing control software;
Charging circuit, for sending electric power by interface;And
Processor, for generating at least one control signal based on the control software,
Wherein, the electric power sent by the interface is used to charge to the battery of the equipment coupled to the interface, and Wherein, at least one described control signal includes make it that monitoring operation is performed to determine the shape of the equipment based on security sweep The information of state, wherein in response to the state of the identified equipment, the processor provide backup signal to the equipment with Request provides Backup Data to the charger from the equipment;And
Second storage region, for storing the Backup Data from the equipment by the interface, the backup number Received according to while the equipment is charged by the charger, wherein after the state of the equipment is determined, institute Processor is stated to provide another control signal to the equipment, when the equipment is charged by the charger, to set described Standby place performs recovery operation simultaneously, and another control signal is by institute after the monitoring operation is performed and in the equipment The equipment is sent to when stating charger charging.
2. charger as claimed in claim 1, wherein, the monitoring operation include to storage in the apparatus one or Multiple files perform the security sweep.
3. charger as claimed in claim 1, wherein, the processor by the interface from the equipment receive information, And the instruction for the state that the information wherein, received provides the equipment based on the monitoring operation.
4. charger as claimed in claim 1, wherein, the state determined and mistake in the equipment are operated by the monitoring Appearance corresponding by mistake.
5. charger as claimed in claim 4, wherein, in wrong file, data or the software with the equipment The pollution of at least one is corresponding.
6. charger as claimed in claim 5, wherein, the bad sector of the pollution from storage medium, viral or another dirt Contaminate at least one in agency.
7. charger as claimed in claim 1, wherein, at least one described control signal is sent to institute by the interface Equipment is stated, is used to charge to the battery while electric power is sent to the equipment by the interface.
8. charger as claimed in claim 1, wherein, the interface is USB (USB) interface.
9. charger as claimed in claim 1, further comprises:
Port, for removedly receiving the connector coupled with the interface.
10. a kind of portable computer, including:
The display of the portable computer;
First storage region, for storing control software;
Charging circuit, for sending electric power by interface;And
Processor, for generating at least one control signal based on the control software,
Wherein, the electric power sent by the interface is used to charge to the battery of the equipment coupled to the interface, and Wherein, at least one described control signal includes make it that monitoring operation is performed to determine the shape of the equipment based on security sweep The information of state, wherein in response to the state of the identified equipment, the processor provide backup signal to the equipment with Request provides Backup Data to the portable computer from the equipment;And
Second storage region, for storing the Backup Data from the equipment by the interface, the Backup Data is Received while the equipment is charged by the charging circuit, wherein the processor provides another control signal to institute Equipment is stated to cause when the equipment is charged by the portable computer, recovery operation is performed simultaneously in the apparatus, Another control signal is after the monitoring operation is performed and when being charged in the equipment by the portable computer It is sent to the equipment.
11. portable computer as claimed in claim 10, wherein, the monitoring operation is included to storage in the apparatus One or more files perform the security sweep.
12. portable computer as claimed in claim 10, wherein:
The processor by the interface from the equipment receive information,
The instruction for the state that described information provides the equipment based on the monitoring operation, and
The state is corresponding with appearance wrong in the equipment.
CN201180075925.7A 2011-12-30 2011-12-30 For the apparatus and method for the operation for managing mobile device Expired - Fee Related CN104081311B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2011/068073 WO2013101176A1 (en) 2011-12-30 2011-12-30 Apparatus and method for managing operation of a mobile device

Publications (2)

Publication Number Publication Date
CN104081311A CN104081311A (en) 2014-10-01
CN104081311B true CN104081311B (en) 2017-07-18

Family

ID=48698410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201180075925.7A Expired - Fee Related CN104081311B (en) 2011-12-30 2011-12-30 For the apparatus and method for the operation for managing mobile device

Country Status (4)

Country Link
US (1) US9594899B2 (en)
EP (1) EP2798428B1 (en)
CN (1) CN104081311B (en)
WO (1) WO2013101176A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104081311B (en) 2011-12-30 2017-07-18 英特尔公司 For the apparatus and method for the operation for managing mobile device
CN104980564A (en) * 2014-04-09 2015-10-14 腾讯科技(深圳)有限公司 Recharge socket and mobile terminal processing method based on recharge socket
CN105278975A (en) * 2014-07-04 2016-01-27 北京奇虎科技有限公司 Power adapter as well as drive program and operating system installation method
CN105389225A (en) * 2015-11-25 2016-03-09 小米科技有限责任公司 Touch screen reporting point processing method and apparatus
CN109863475A (en) * 2017-10-09 2019-06-07 华为技术有限公司 The upgrade method and relevant device of a kind of application in safety element
US10956563B2 (en) * 2017-11-22 2021-03-23 Aqua Security Software, Ltd. System for securing software containers with embedded agent
CN113597721A (en) * 2019-02-25 2021-11-02 美国斯耐普公司 Charging cable with charging state indication
US20240386107A1 (en) * 2021-05-11 2024-11-21 B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University A computerized charging/interface device with malware detection and backup capabilities
WO2023058027A1 (en) * 2021-10-10 2023-04-13 B.G. Negev Technologies And Applications Ltd., At Ben-Gurion University A computerized charging/interface device with application marketplace and ecosystem capabilities

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101341491A (en) * 2005-12-20 2009-01-07 西姆毕恩软件有限公司 Malicious software detection in a computing device
CN102097832A (en) * 2010-10-27 2011-06-15 国家电网公司 Charging and battery replacing monitoring system and method based on internet of things

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3217007B2 (en) * 1997-02-24 2001-10-09 埼玉日本電気株式会社 Mobile phone device with security function
US6664760B2 (en) * 2001-11-23 2003-12-16 God Co., Ltd. Cellular phone charger with data backup function and cellular phone data backup device
FI20020570A0 (en) * 2002-03-25 2002-03-25 Nokia Corp Time division of tasks on a mobile phone
US20050253554A1 (en) * 2004-05-14 2005-11-17 Interdigital Technology Corporation Apparatus for backing up data stored in a portable device
US7591018B1 (en) * 2004-09-14 2009-09-15 Trend Micro Incorporated Portable antivirus device with solid state memory
US20060158154A1 (en) * 2005-01-18 2006-07-20 Maurilus Jean R Method and apparatus for backing up data from cell phones and other hand-held devices
US8086281B2 (en) 2007-01-06 2011-12-27 Apple Inc. Apparatuses and methods that facilitate the transfer of power and information among electrical devices
US20070096685A1 (en) * 2005-10-28 2007-05-03 Q - Dog Ab, Apparatus for charging handheld units
JP4833224B2 (en) * 2005-12-09 2011-12-07 パナソニック株式会社 Information communication terminal device and automatic backup system including the device
TW200725271A (en) * 2005-12-27 2007-07-01 Inventec Appliances Corp Battery charger capable of backing up information of a mobile phone and method thereof
US7966500B2 (en) 2006-02-21 2011-06-21 Jeremiah Emmett Martilik Remote connecting and shielding power supply system
US7975304B2 (en) * 2006-04-28 2011-07-05 Trend Micro Incorporated Portable storage device with stand-alone antivirus capability
US8725924B2 (en) * 2006-06-01 2014-05-13 Clevx, Llc Information backup system with storing mechanism and method of operation thereof
US20100011442A1 (en) * 2008-07-09 2010-01-14 Sumwintek Corp. Data security device for preventing the spreading of malware
US8631488B2 (en) * 2008-08-04 2014-01-14 Cupp Computing As Systems and methods for providing security services during power management mode
JP5321277B2 (en) * 2009-06-19 2013-10-23 富士通株式会社 Terminal device, setting notification system, notification method
US8922329B2 (en) * 2009-07-23 2014-12-30 Qualcomm Incorporated Battery charging to extend battery life and improve efficiency
US8910288B2 (en) * 2010-02-05 2014-12-09 Leidos, Inc Network managed antivirus appliance
US20110300906A1 (en) * 2010-06-02 2011-12-08 Colgan Joseph G Multi-Function Cell Phone Charger Apparatus
US20120272320A1 (en) * 2011-04-25 2012-10-25 Verizon Patent And Licensing Inc. Method and system for providing mobile device scanning
US9152202B2 (en) * 2011-06-16 2015-10-06 Microsoft Technology Licensing, Llc Mobile device operations with battery optimization
US11392708B2 (en) * 2011-08-05 2022-07-19 Harris Corporation Method and system for embedding security in a mobile communications device
US8584243B2 (en) * 2011-11-09 2013-11-12 Kaprica Security, Inc. System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner
CN104081311B (en) 2011-12-30 2017-07-18 英特尔公司 For the apparatus and method for the operation for managing mobile device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101341491A (en) * 2005-12-20 2009-01-07 西姆毕恩软件有限公司 Malicious software detection in a computing device
CN102097832A (en) * 2010-10-27 2011-06-15 国家电网公司 Charging and battery replacing monitoring system and method based on internet of things

Also Published As

Publication number Publication date
CN104081311A (en) 2014-10-01
EP2798428B1 (en) 2018-09-12
US20140013428A1 (en) 2014-01-09
US9594899B2 (en) 2017-03-14
WO2013101176A1 (en) 2013-07-04
EP2798428A4 (en) 2015-08-12
EP2798428A1 (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN104081311B (en) For the apparatus and method for the operation for managing mobile device
CN106598635B (en) Recovery method of baseboard management controller and baseboard management controller
CN103207975B (en) The method of protection password and computing machine
CN105144074B (en) It is stored using the block of hybrid memory device
TWI362588B (en) Monitor apparatus, a monitoring method thereof and computer apparatus therewith
TW201502790A (en) Redundant system boot code in a secondary non-volatile memory
CN104899055A (en) BIOS control based ME updating system and updating method thereof
CN111694760B (en) Server system, flash memory module and method for updating firmware mapping file
CN109933182A (en) A method, device and system for diagnosing power failure of a server
US10275330B2 (en) Computer readable non-transitory recording medium storing pseudo failure generation program, generation method, and generation apparatus
CN111984490A (en) Warning device, method, equipment and medium for illegal operating system starting item
CN117055822B (en) NVME SSD Raid card board power-carrying system and control method
CN109783390A (en) PSU firmware upgrade and upgrade stability test method, device, terminal and storage medium
CN112231140A (en) Method, system, terminal and storage medium for fault recovery of BMC (baseboard management controller) of storage device
WO2024119787A1 (en) Method and apparatus for amd server system installation power-off processing, device and medium
CN111367700A (en) A forced recovery method, system and related components after BMC is down
CN114816481B (en) Firmware batch upgrading method, device, equipment and storage medium
CN116893922A (en) A method and device for powering on a server with a PCIe expansion board
JP5223688B2 (en) Uninterruptible power supply management device and management method
CN110798347B (en) Service state detection method, device, equipment and storage medium
US11281764B2 (en) Safe battery authentication
CN115048147A (en) Firmware upgrading method, device, equipment and storage medium
CN114490200A (en) Memory test method and device, computer equipment and storage medium
CN114153503A (en) A BIOS control method, device and medium
CN111400076B (en) Downtime restoration method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170718

Termination date: 20191230

CF01 Termination of patent right due to non-payment of annual fee